Discovering a Secure Path in MANET by Avoiding Black Hole Attack

Abstract

In a mobile ad hoc network (MANET), a source node must rely on intermediate nodes to forward its packets along multi-hop routes to the destination node. Due to the lack of infrastructure in such networks, secure and reliable packet delivery is challenging. The performance of a Mobile Ad hoc Network (MANET) is closely related to the capability of the implemented routing protocol to adapt itself to unpredictable changes of topology network and link status. One of this routing protocol is OLSR [1] (Optimized Link State Routing Protocol) which assumes that all nodes are trusted. However, in hostile environnement, the OLSR is known to be vulnerable to various kinds of malicious attacks. This paper proposes a cooperative black hole attack against MANETs exploiting vulnerabilities of OLSR. In this attack, two attacking nodes cooperate in order to disrupt the topology discovery and prevent routes to a target node from being established in the network.

Authors and Affiliations

Hicham Zougagh, Ahmed Toumanari, Rachid Latif, Y. Elmourabit, Noureddine Idboufker

Keywords

Related Articles

Similarity Calculation Method of Chinese Short Text Based on Semantic Feature Space

In order to improve the accuracy of short text similarity calculation, this paper presents the idea that use the history of short text messages to construct semantic feature space, then use the vector in semantic feature...

Comparison between Commensurate and Non-commensurate Fractional Systems

This article deals with fractional systems that rep-resent better physical process and guarantee a very small number of parameters that can reduces the computation time. It focuses in particular on the state-space repres...

Prediction of Stroke using Data Mining Classification Techniques

Stroke is a neurological disease that occurs when a brain cells die as a result of oxygen and nutrient deficiency. Stroke detection within the first few hours improves the chances to prevent complications and improve hea...

CREeLS: Crowdsourcing based Requirements Elicitation for eLearning Systems

Crowdsourcing is the process of having a task performed by the crowd. Because of the Web evolution, recently crowdsourcing is being used in the field of Requirements Engineering to help in simplifying its activities. Amo...

Hijaiyah Letter Interactive Learning for Mild Mental Retardation Children using Gillingham Method and Augmented Reality

Assistive technology for children with special needs is a problem that is interesting to study. Collaboration between methods and latest technology can be used as a learning aid for them. Learning of Hijaiyah letters is...

Download PDF file
  • EP ID EP131933
  • DOI 10.14569/IJACSA.2014.050819
  • Views 93
  • Downloads 0

How To Cite

Hicham Zougagh, Ahmed Toumanari, Rachid Latif, Y. Elmourabit, Noureddine Idboufker (2014). Discovering a Secure Path in MANET by Avoiding Black Hole Attack. International Journal of Advanced Computer Science & Applications, 5(8), 123-130. https://europub.co.uk/articles/-A-131933